CS205 Quiz 1 File by Tanveer Online Academy - Copy
CS205 Quiz 1 File by Tanveer Online Academy - Copy
to entire organization;
management
The verizon and symantec reports show that_______________. Email is the most
attacked vector
information security
implementation
of correctness and
coverage of security
control implementation
Policies and procedures are the part of ___________ layer in Security governance
security posture
In an IT network how data exfiltration can be avoided at edge? Through network DLP
solution
The purpose of the information security lifecycle is to ensure All security projects &
and steps
risk-based approach
minimize risk
The DMZ is an important zone in the network with the Allowing external access
providing a layer of
network?
event
information security
program
by________________.
IT/ Infosec Teams require information security project report Daily
at ________basis.
to assist governments
security posture.
One of the challenges in effective implementation of a security Adhoc culture and lack
is_______________.
quickly, self-provisioned,
or moved between
The IT global cyber security index (GCI) is______________. An initiative that covers
to assist governments
security posture.
Security governance simply means_________________. Managing the security
program
Awareness.
information security
objectives
for establishing it
The ITU global cyber security index (GCI) covers: Legal, technical,
organizational, capacity
on_____________.
One of the major challenges of information security in Pakistan Not funded adequately
is that it is_____________________.
predictability to the
desired outcomes of any
organizational activity
hardening activities
junior staff
security lifecycle, the following activities are planned and controls, resources,
The 4 layer security transformation model and isms May form essential
program
It would be correct to say that the security posture in Pakistan Effective actions taken
organizations, and
building an effective
rank______________.
What are the three types of redundant site models in an Hot site, cold site and
Q-RADAR
ranked__________.
security activities
the organization
integration into
processes, resources,
communication,
promoting continual
improvement, intended
outcomes
that an organization
normal operations to
The information security transformation model: Four layers, with the first
bottom: security
hardening
monitoring the
vulnerability
management program,
facilitate incident
management process
The key factor related to cloud, mobile, IOT, and social is It has further